Analysis

  • max time kernel
    1918s
  • max time network
    1816s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    11-05-2024 07:27

General

  • Target

    test.ps1

  • Size

    1KB

  • MD5

    09e2c59da57ed984a09ff11dc442b029

  • SHA1

    49b85d8cfe08b4d7cc7e077125339fc599191ae7

  • SHA256

    760b99362ec0a00b18dcd298c8a684b156f5af180b606a8d5c660a05d2d0b645

  • SHA512

    578d59b5f3d09de043200eed4186f360aa0cca4cca902ff5efb32f7e7ef250ea091c395d995d910ad1245158eaf52d163e0ea713d4830f4142ccca4670d4d0fb

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\test.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2972
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\WriteSubmit.vdw
    1⤵
    • Modifies registry class
    PID:2316
  • C:\Program Files\VideoLAN\VLC\vlc.exe
    "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\StopStep.WTV"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:2192
  • C:\Windows\system32\cmd.exe
    "C:\Windows\system32\cmd.exe"
    1⤵
      PID:2908
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      1⤵
        PID:320
      • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde
        1⤵
        • Enumerates system info in registry
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1028
      • C:\Program Files\VideoLAN\VLC\vlc.exe
        "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\UnlockRequest.avi"
        1⤵
          PID:1672
        • C:\Windows\explorer.exe
          "C:\Windows\explorer.exe"
          1⤵
            PID:2008
          • C:\Windows\system32\AUDIODG.EXE
            C:\Windows\system32\AUDIODG.EXE 0xc4
            1⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2528

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1028-29-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/1672-33-0x000007FEF57C0000-0x000007FEF58D2000-memory.dmp

            Filesize

            1.1MB

          • memory/1672-31-0x000007FEF8280000-0x000007FEF82B4000-memory.dmp

            Filesize

            208KB

          • memory/1672-32-0x000007FEF5DD0000-0x000007FEF6084000-memory.dmp

            Filesize

            2.7MB

          • memory/1672-30-0x000000013F390000-0x000000013F488000-memory.dmp

            Filesize

            992KB

          • memory/2192-26-0x000007FEF5BE0000-0x000007FEF5C14000-memory.dmp

            Filesize

            208KB

          • memory/2192-28-0x000007FEF45F0000-0x000007FEF569B000-memory.dmp

            Filesize

            16.7MB

          • memory/2192-27-0x000007FEF5920000-0x000007FEF5BD4000-memory.dmp

            Filesize

            2.7MB

          • memory/2192-25-0x000000013FA80000-0x000000013FB78000-memory.dmp

            Filesize

            992KB

          • memory/2972-8-0x000007FEF5AF0000-0x000007FEF648D000-memory.dmp

            Filesize

            9.6MB

          • memory/2972-12-0x000007FEF5AF0000-0x000007FEF648D000-memory.dmp

            Filesize

            9.6MB

          • memory/2972-11-0x000007FEF5AF0000-0x000007FEF648D000-memory.dmp

            Filesize

            9.6MB

          • memory/2972-10-0x000007FEF5AF0000-0x000007FEF648D000-memory.dmp

            Filesize

            9.6MB

          • memory/2972-9-0x000007FEF5AF0000-0x000007FEF648D000-memory.dmp

            Filesize

            9.6MB

          • memory/2972-4-0x000007FEF5DAE000-0x000007FEF5DAF000-memory.dmp

            Filesize

            4KB

          • memory/2972-7-0x000007FEF5AF0000-0x000007FEF648D000-memory.dmp

            Filesize

            9.6MB

          • memory/2972-6-0x0000000002910000-0x0000000002918000-memory.dmp

            Filesize

            32KB

          • memory/2972-5-0x000000001B550000-0x000000001B832000-memory.dmp

            Filesize

            2.9MB